[tor-commits] [stem/master] Connection pydoc spelling corrections
atagar at torproject.org
atagar at torproject.org
Tue Dec 27 18:25:28 UTC 2011
commit 839df4492c61777eaf660665a2aeb0d4267251bb
Author: Damian Johnson <atagar at torproject.org>
Date: Tue Dec 27 10:24:40 2011 -0800
Connection pydoc spelling corrections
Just some quick corrections now that this module has reached maturity. I'll
check the other modules later.
---
stem/connection.py | 14 +++++++-------
1 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/stem/connection.py b/stem/connection.py
index 6b914f8..eb5da62 100644
--- a/stem/connection.py
+++ b/stem/connection.py
@@ -7,7 +7,7 @@ authenticated control connection. This is handy for CLI applications and the
python interactive interpretor, but does several things that makes it
undesirable for applications (uses stdin/stdout, suppresses exceptions, etc).
-The 'authenicate' function, however, gives easy but fine-grained control over
+The 'authenticate' function, however, gives easy but fine-grained control over
the authentication process. For instance...
import sys
@@ -319,7 +319,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
stem.connection.UnreadableCookieFile
Tor allows for authentication by reading it a cookie file, but we can't
- read that file (probaby due to permissions).
+ read that file (probably due to permissions).
stem.connection.IncorrectCookieValue (*)
Tor allows for authentication by reading it a cookie file, but rejected
@@ -338,8 +338,8 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
including socket failures, malformed controller responses, etc. These
mostly constitute transient failures or bugs.
- * In practice it is highly unusual for this to occure, being more of a
- theoretical possability rather than something you should expect. It's
+ * In practice it is highly unusual for this to occur, being more of a
+ theoretical possibility rather than something you should expect. It's
fine to treat these as errors. If you have a use case where this commonly
happens, please file a ticket on 'trac.torproject.org'.
@@ -379,7 +379,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
if AuthMethod.COOKIE in auth_methods and protocolinfo_response.cookie_path == None:
auth_methods.remove(AuthMethod.COOKIE)
- auth_exceptions.append(NoAuthCookie("our PROTOCOLINFO reponse did not have the location of our authentication cookie"))
+ auth_exceptions.append(NoAuthCookie("our PROTOCOLINFO response did not have the location of our authentication cookie"))
if AuthMethod.PASSWORD in auth_methods and password == None:
auth_methods.remove(AuthMethod.PASSWORD)
@@ -426,7 +426,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
# We really, really shouldn't get here. It means that auth_exceptions is
# either empty or contains something that isn't an AuthenticationFailure.
- raise AssertionError("BUG: Authenticaion failed without providing a recognized exception: %s" % str(auth_exceptions))
+ raise AssertionError("BUG: Authentication failed without providing a recognized exception: %s" % str(auth_exceptions))
def authenticate_none(control_socket, suppress_ctl_errors = True):
"""
@@ -533,7 +533,7 @@ def authenticate_cookie(control_socket, cookie_path, suppress_ctl_errors = True)
validation that this is a cookie before presenting the contents to the
socket.
- The IncorrectCookieSize and UnreadableCookieFile exceptions take precidence
+ The IncorrectCookieSize and UnreadableCookieFile exceptions take precedence
over the other types.
If authentication fails tor will disconnect and we'll make a best effort
More information about the tor-commits
mailing list